Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    80s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2025, 21:39

General

  • Target

    HawkEye.exe

  • Size

    232KB

  • MD5

    60fabd1a2509b59831876d5e2aa71a6b

  • SHA1

    8b91f3c4f721cb04cc4974fc91056f397ae78faa

  • SHA256

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

  • SHA512

    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

  • SSDEEP

    3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (3253) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HawkEye.exe
    "C:\Users\Admin\AppData\Local\Temp\HawkEye.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4544
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:5884
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5884 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5140
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd825b46f8,0x7ffd825b4708,0x7ffd825b4718
      2⤵
        PID:228
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
        2⤵
          PID:2568
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3216
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:8
          2⤵
            PID:1880
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
            2⤵
              PID:3676
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:184
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                2⤵
                  PID:1720
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:1
                  2⤵
                    PID:2028
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:1
                    2⤵
                      PID:660
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
                      2⤵
                        PID:2468
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                        2⤵
                          PID:4556
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 /prefetch:8
                          2⤵
                            PID:4432
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4696
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
                            2⤵
                              PID:4400
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                              2⤵
                                PID:3924
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:1
                                2⤵
                                  PID:4168
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                                  2⤵
                                    PID:4604
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5596 /prefetch:8
                                    2⤵
                                      PID:5344
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:1
                                      2⤵
                                        PID:3516
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6528 /prefetch:8
                                        2⤵
                                          PID:5860
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:1
                                          2⤵
                                            PID:5992
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6696 /prefetch:1
                                            2⤵
                                              PID:5984
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,11853580789310082698,6983788493968677788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6532 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5124
                                            • C:\Users\Admin\Downloads\Avoid.exe
                                              "C:\Users\Admin\Downloads\Avoid.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of FindShellTrayWindow
                                              PID:4500
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1204
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3188

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                Filesize

                                                4KB

                                                MD5

                                                371b682e33fb19241fc61887534c7623

                                                SHA1

                                                8dbb2c74a839f51d38e7b170b58ccd5bb1b119f2

                                                SHA256

                                                894036da1d685ec572227f133c84ffc8bd5c0f2f3a613db86a8e2f113c0ecc2d

                                                SHA512

                                                9b3a476adfb74c1830c70c26b652a54ee0372b901125b1271f4c6f595de61dcd9265f985a309a7e5c41bf3747430de9e1261843f52ab3dce6386c10cb1fcbc43

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                Filesize

                                                471B

                                                MD5

                                                9bf51918a12f03ca4f26d83e99645740

                                                SHA1

                                                9c83d4a1ee3ee73e734776e29009d37e2273183e

                                                SHA256

                                                c04f101c94199d3b225ad950b34b6a4d7e1d5392e01b01fde11adebfae33aa5e

                                                SHA512

                                                6c8e8ad3940371f69a04f56dfd8da664a2bfbbcf3dcfce35903faeb46d301a38c72fb6f65d812e5018b5dbdf74ee293520fd6a34976e2b98285ad62114b891ef

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                Filesize

                                                404B

                                                MD5

                                                115188be19676fd8b201d7122e44c06e

                                                SHA1

                                                403935f87ba9e32e85fc5fde7138e73304cee2c5

                                                SHA256

                                                7a5d69083703baeed4888e5a94a04bec1ebe22b7d38be42fe019e283beb8bd15

                                                SHA512

                                                436fcc10d1d42c33583c426a94476411aa777a9cd63614dd08080e6c9d92599fa488a737a3887129f1bfc1737c97a751fd4c35458d48c6dcdf8e63674f12cda1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                37f660dd4b6ddf23bc37f5c823d1c33a

                                                SHA1

                                                1c35538aa307a3e09d15519df6ace99674ae428b

                                                SHA256

                                                4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                SHA512

                                                807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                d7cb450b1315c63b1d5d89d98ba22da5

                                                SHA1

                                                694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                SHA256

                                                38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                SHA512

                                                df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                3KB

                                                MD5

                                                53ce01b2b0f0fb86a9471d14b1e071b7

                                                SHA1

                                                36b19ce3d8866bd3fa132d51df32149a4f00a164

                                                SHA256

                                                9b8336ce33efb55017ee6bf2cbc99fde0ad24aaf61d913ea8030f026bcafe24b

                                                SHA512

                                                2de942e0f0502f0eccb314cb8be8d3c5019f6fe9e167f45c304c68cad171138f94cb1f07640b10a46d54a7e4121303b2f28852b8fa0c20208597ee2bbc9cff86

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                871B

                                                MD5

                                                74140ba0d545d10f72f05962987d675f

                                                SHA1

                                                9c067409d1238c759a2cb67131f3ce01dd9da498

                                                SHA256

                                                86b8760627d87d11e58ba2970297a698518110508da9520b239f317574fedc11

                                                SHA512

                                                076b11691cbdb1ad3885da1c8c9678dd6a72d50f96f1d7a54f645e976d6a82704f58b5b444f348a234bd61846d79c40889058eaed4244b70f631b102b1f02f6d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                7KB

                                                MD5

                                                6c2b8e39f3e6277ed948296a969d4774

                                                SHA1

                                                1a645dd0acce3c217e4be4370786189c08bc0519

                                                SHA256

                                                04a813f26345f472271827edc3ee735b43f77d164c72509702b971a5ed0f3c42

                                                SHA512

                                                3cd923e23f315e637e2a552d29168e96d74fcc5699af222e8d5443705335e26625eb38f6b6f359d4bef0609fea50798a114ea6a811d6ad5d0dbbf46142a4a43b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                e4ed442ca427cf8de8e61457d6b29b15

                                                SHA1

                                                5a967ed76ecb504416cfa9150444f53641b962e1

                                                SHA256

                                                07de7c1111a3e7676f34045a1c6603608091c7249c54a729108c852a52541bee

                                                SHA512

                                                4baef841988ca92604c477c74c074dc238ddbb7e68a87f12271ec18c3b234272d14ccad597cf8d5dc0563f4992e61c3465e90b11417795b613f5b8be289b45fd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                1cb927a8a4dffee1474be2f707118617

                                                SHA1

                                                641efca525bbffdfcabe2685fb2a48317304cd6c

                                                SHA256

                                                b48e943d4498271b1663b4b4fa866767dc84aa7f615df2a3d9c30bea767cab03

                                                SHA512

                                                135f61d0a0649b51ae6338d112228b513993f4d83347b83eda21945ce67151ec82105abfdf3a9ceb12e133704ddcb5aeae1df01299daf0f3e9db8448ba1b8fe6

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                4e5a07c85ccef7896fb02b91acfdf90d

                                                SHA1

                                                7b51061b54baa8f074e39110e34b3b7ff04a5a9e

                                                SHA256

                                                a901dc8012f1d91289b4b2e7ee2ed5ba1dc8225ef6cc975f0f5f7bded0cdef11

                                                SHA512

                                                9fd5d22002baf59f0346383c52c3872b8c18ed0c3e9f0d3bdca6c2474a780665624be6cb903145479451cf98481ada183ea36d68e21b6fc866999738e8b145ff

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                0678ec7f78fe0b9cc4856f3a484661d9

                                                SHA1

                                                5c3578942183616258106ed68bbf11d91fd7a25f

                                                SHA256

                                                dd8787ec901994cea3ec56004e682f6da164d7e9b3375f37421299abd1bb2403

                                                SHA512

                                                426725a2d1840b21685b5f7ffe00a1c5515409a35e861da1da857eda98575e428f9fb5951ea4b9167db94c0b8ea5ce989c7639510e874c78a9ec4477ec669a70

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                d48d7a12bc54a57db837865134746e77

                                                SHA1

                                                0363a834cfedd122fecd6fe64bd49aea90693d68

                                                SHA256

                                                381ea32f49cf46c394c6b2813f43ff06045e18a5be95d9ed2a4ca3fc705848eb

                                                SHA512

                                                36738c71cbdda58d54d1245942c24ddf0d41584dc9768b8536aa5a2159d282cdf001bb4ac2ce0b7373f8a7d84bd6f49838d1584c301194d0e6d41a52c16f72c3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                1722f333dcb67c936cb53a334852a77a

                                                SHA1

                                                0b6119b927643b8d81e9c589e8889337fd4a6278

                                                SHA256

                                                26cfec368e745f99ff7ad478fba5a12b8ed45d7f0e353476e66db607a82e7312

                                                SHA512

                                                96c212a615e24f2b20ac65af07f5b1ea58caa71b78302f7cc915d83ab7769bed6c5bf1fb21a83a4fc4a6d087eac41787b5a37965e4636cac14bb3568d659ba5e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                1693a98472f2dadeed471471eee19e5f

                                                SHA1

                                                ba8f313e72d997d5f7c56456c33a1b40d4e76fef

                                                SHA256

                                                bad0600f045f55f93721a1a9f55aa046fb65a27c1b7c4760f2d28f896cc4a172

                                                SHA512

                                                30c0a1271f25a2f910c4401f6a1085e091bf3e73ce2831c17e7687c985f0abad21543aee752c732cddc390bb32f5db22959cecf82bd5f001450b8f35ab05d99a

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f5ba.TMP

                                                Filesize

                                                1KB

                                                MD5

                                                2fce3e5e2967aabb795166a69c3a85b5

                                                SHA1

                                                b98af1c184568db6e89cad908e4e7f5af4927547

                                                SHA256

                                                7c606e7b28c0810cb3a9bebb25edb841fe28599792d984afa933f5b0d7a83397

                                                SHA512

                                                16837e857ed70798818259f6c82585410f503297f4d5beaa675756d41d9b875d51be737066257db5344b1a8a9916289b633e686880d4d23c389de73b52d82151

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                8967c0c427af537f98464e4f24d0319e

                                                SHA1

                                                db0d117f5c2bb21bac9dcf6b91ace18b8604a722

                                                SHA256

                                                44686b5574ef9d11434bdd519a9e305c328f892e6bcff0f2db2eb02b3f63e5a7

                                                SHA512

                                                043e962115b274e2672b5a31b6b2dfdec702ee3eb0fbe86ee0e753ebdcf6cd22b76ea57166686c5ffb97470b5df3eb837ce431b31d6282ee2cfff63c6bb238db

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                4cd2e1cbc2575419e35530f8bb172bf5

                                                SHA1

                                                99c092ff68231ad5b114c94dc97a2dd5bad51398

                                                SHA256

                                                f0af009f41b5ef0ee579fe9ce29961eec4f8152f65193c9a94a5050d9b93963f

                                                SHA512

                                                a4cf367d01be1fcdd0cce82f47fc1e292eac5ffc2f20614a2e5adbb20256975cdc30321b0b3adb51c3e8a8245b0c9c506e04eade3e88237ad9ddbb11525a21ff

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                8c13413cc344f4b84a4d0722834f900c

                                                SHA1

                                                ece615f89315ea15ede973046a37343bc55a92e9

                                                SHA256

                                                b37611a762d26bd47b6bded76cb63676ac82a1843b763d03ae29e950077b0637

                                                SHA512

                                                c70cd2807cfef7188034070cedbf0b0f8928f7e49e660c41ad9ce619e8b0d19cb4118ec852c01a0ce05c0581affeaeaf87a321d8b21f0a62a5679703cbc0a64d

                                              • C:\Users\Admin\Downloads\Unconfirmed 402764.crdownload

                                                Filesize

                                                248KB

                                                MD5

                                                20d2c71d6d9daf4499ffc4a5d164f1c3

                                                SHA1

                                                38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

                                                SHA256

                                                3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

                                                SHA512

                                                8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

                                              • memory/4500-8235-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                Filesize

                                                664KB

                                              • memory/4544-9-0x0000000005340000-0x000000000535A000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/4544-0-0x0000000074BE2000-0x0000000074BE3000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4544-616-0x0000000074BE2000-0x0000000074BE3000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4544-8-0x0000000074BE0000-0x0000000075191000-memory.dmp

                                                Filesize

                                                5.7MB

                                              • memory/4544-617-0x0000000074BE0000-0x0000000075191000-memory.dmp

                                                Filesize

                                                5.7MB

                                              • memory/4544-3-0x0000000010000000-0x0000000010010000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4544-2-0x0000000074BE0000-0x0000000075191000-memory.dmp

                                                Filesize

                                                5.7MB

                                              • memory/4544-1-0x0000000074BE0000-0x0000000075191000-memory.dmp

                                                Filesize

                                                5.7MB